Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Sharmila Deva Selvi"'
Publikováno v:
Journal of Internet Services and Information Security, Vol 6, Iss 4, Pp 35-53 (2016)
Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity rev
Externí odkaz:
https://doaj.org/article/13eb9076ff9042d49530635ba9539033
Publikováno v:
Progress in Cryptology – INDOCRYPT 2020 ISBN: 9783030652760
INDOCRYPT
INDOCRYPT
Attribute-based proxy re-encryption (ABPRE) allows a semi-trusted proxy to transform an encryption under an access-policy into an encryption under a new access policy, without revealing any information about the underlying message. Such a primitive f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::05364b90cd8d6769edd47daf050eb60b
https://doi.org/10.1007/978-3-030-65277-7_29
https://doi.org/10.1007/978-3-030-65277-7_29
Publikováno v:
Mathematical Research for Blockchain Economy ISBN: 9783030371098
MARBLE
MARBLE
Recently, blockchain technology has attracted much attention of the research community in several domains requiring transparency of data accountability, due to the removal of intermediate trust assumptions from third parties. One such application is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee4c02db8f4e037b49442892402bcdf9
https://doi.org/10.1007/978-3-030-37110-4_4
https://doi.org/10.1007/978-3-030-37110-4_4
Publikováno v:
DAPPCON
The blockchain technology and a vast amount of cryptocurrency related activities have generated an unprecedented level of interest among the public. However, even at the entry level, cryptocurrency users need to deal with the complex task of key mana
Publikováno v:
Security, Privacy, and Anonymity in Computation, Communication, and Storage ISBN: 9783030249069
SpaCCS
SpaCCS
Anonymity is one of the most desired properties of a Proxy Re-encryption scheme. Any user communicating over the public channel, availing cloud for proxy re-encryption services requires that any entity (an attacker or cloud administrator) must not in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::07ab148a8deabf7e2583b35c298d6f82
https://doi.org/10.1007/978-3-030-24907-6_36
https://doi.org/10.1007/978-3-030-24907-6_36
Autor:
Akshayaram Srinivasan, Sharmila Deva Selvi Selvaraj, Pandu Rangan Chandrasekaran, Sree Vivek Sivanandam
Publikováno v:
Security and Communication Networks. 9:1650-1662
The indistinguishability of ciphertext under the chosen ciphertext attack IND-CCA2 is often considered to offer the strongest security notion for a public key encryption system. Nowadays, because of the availability of powerful malwares, an adversary
Publikováno v:
Information and Communications Security ISBN: 9783319894997
ICICS
ICICS
In this paper, we focus on identity-based group encryption. We have revisited “Identity-Based Group Encryption (IBGE)” proposed by Xiling et al. Their scheme claims to achieve anonymity of the receiver. We have shown that the zero-knowledge proof
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::006ef6cbbc238f7583562d989917549a
https://doi.org/10.1007/978-3-319-89500-0_18
https://doi.org/10.1007/978-3-319-89500-0_18
Publikováno v:
Cryptology and Network Security ISBN: 9783030026400
CANS
CANS
Proxy re-encryption (PRE) enables delegation of decryption rights by entrusting a proxy server with special information, that allows it to transform a ciphertext under one public key into a ciphertext of the same message under a different public key,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecbc39cdda68cd812aed3e9ac3b62d71
https://doi.org/10.1007/978-3-030-02641-7_21
https://doi.org/10.1007/978-3-030-02641-7_21
Publikováno v:
Provable Security ISBN: 9783030014452
ProvSec
ProvSec
Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy re-encryption services of the cloud. Proxy Re-Encr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::952d8062dfcba9fb719f4334a1a5ac3c
https://doi.org/10.1007/978-3-030-01446-9_7
https://doi.org/10.1007/978-3-030-01446-9_7
Publikováno v:
Provable Security ISBN: 9783319686363
ProvSec
ProvSec
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss [4] to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice (delegator) to a ciphertext for Bob (delegatee
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2e86b421d5623ef7d011267f0c4cf543
https://doi.org/10.1007/978-3-319-68637-0_25
https://doi.org/10.1007/978-3-319-68637-0_25